How to use virtual private networking to join or access an internal domain from an external client by using Microsoft ISA Server 2006 or in ISA Server 2004 or Microsoft Forefront Threat Management Gateway, Medium Business Edition

This article has been archived. It is offered "as is" and will no longer be updated.

SUMMARY

A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks such as the Internet. You can send data between two computers by using a VPN across a shared or public network in a manner that emulates a point-to-point private link. VPN connections allow users who work at home or travel to obtain a remote access connection to an organization server by using the infrastructure that is provided by a public network, such as the Internet.

This article discusses about how to configure ISA Server for VPN in different scenarios.

MORE INFORMATION

ISA Server enables you to configure and manage site-to-site VPN connections and VPN remote client access to the corporate network. For site-to-site VPN connections, you configure a VPN gateway on the local and remote computers.

For remote site VPN connections, you can use ISA Server’s VPN quarantine capabilities to include the VPN clients on a quarantined VPN clients network until their compliance with corporate security requirements are verified. If the clients qualify after the verification process, the VPN clients are moved to the VPN clients network. The quarantined VPN clients network and the VPN clients network are subject to the ISA Server firewall access policy. This helps you control VPN client access to network resources.

For more information about how to configure secure remote access that uses ISA Server, visit the following Microsoft Web site: